Professional Documents
Culture Documents
Mohammad Hossein Mamshaei, Gion Reto Cantieni∗, Chadi Barakat, and Thierry Turletti
Institut National de Recherche en Informatique et en Automatique (INRIA)
2004 route des Lucioles, Sophia-Antipolis, France 06902
Telephone: +33492387610, Fax: +33492387978
Email: {manshaei,barakat,turletti}@sophia.inria.fr
Other
NAV update with CTS CW
time: DIFS SIFS SIFS SIFS DIFS In each physical layer, there is a basic transmission mode
(usually used to send ACK, RTS, CTS and PLCP header)
Figure 1. CSMA/CA with RTS/CTS exchange. which has the maximum coverage range among all trans-
mission modes. This maximum range is obtained using
BPSK or DBPSK modulation which have the minimum
If the channel is busy for the source STA, a backoff time probability of bit error for a given SNR compared to other
(measured in slot times) is chosen randomly in the inter- modulation schemes. It has the minimum data rate as well.
val [0, CW ), where CW is called the contention window. As shown in Fig. 2, each packet may be sent using two dif-
This timer is decremented by one as long as the channel ferent rates; the PLCP header is sent at the basic rate while
is sensed idle for a DIFS (Distributed Inter Frame Space) the rest of the packet might be sent at a higher rate. The
time. It stops when the channel is busy and resumes when basic rate is 1 Mbps (with DBPSK modulation and CRC
the channel is idle again for at least DIFS time. CW is an 16 bits) for 802.11b and 6 Mbps (with BPSK and FEC rate
integer with the range determined by PHY layer characteris- equal to 1/2) for 802.11a. The higher rate used to trans-
tics: CWmin and CWmax . CW will be doubled after each mit the physical-layer payload (which includes the MAC
unsuccessful transmission, up to the maximum value which header) is indicated in the PCLP header.
is determined by CWmax + 1. The PLCP Protocol Data Unit (PPDU) frame includes
When the backoff timer reaches zero, the source trans- PLCP preamble, PLCP header, and MPDU. Fig. 3 shows
mits the data packet. The ACK is transmitted by the receiver the format for long preamble in 802.11b. The PLCP pream-
immediately after a period of time called SIFS (Short Inter ble contains the following fields: Synchronization (Sync)
2
Eb
PLCP Header Mac Header + Payload where N 0
is the average signal to noise ratio per bit. The
Eb
N0 of the received signal is derived from SN R using the
Sent with Basic Rate Sent with the rate indicated in PLCP
following relationship:
Figure 2. Packet format in IEEE 802.11. Eb W
= SN R · (4)
N0 Rb
and Start Frame Delimiter (SDF). The PLCP Header con- where Rb (1 and 2 Mbps) is the maximum bit rate of
tains the following fields: Signal, Service, Length, and transmission mode and W (2 MHz) is the unspread band-
CRC. The short PLCP preamble and header may be used width of the signal. Considering the data packet format
to minimize overhead and thus maximize the network data shown in Figure 2 the probability of error for packet is:
throughput. Note that the short PLCP header uses the 2
Mbps with DQPSK modulation and a transmitter using the
p = P ER = 1 − (1 − PeP LCP ) · (1 − PeP ayload ) (5)
short PLCP only can interoperate with the receivers which
are capable of receiving this short PLCP format. In this pa- Where Pe is the probability of error for PLCP (or Pay-
per we suppose that all stations use the long PPDU format load) and is given by:
in 802.11b. We evaluate our model in 802.11b where STAs
use transmission rate equal to 1 and 2 Mbps. Our model Pe = 1 − (1 − Pb )Length (6)
can be employed for all other transmission modes for all
standards if the packet error rate is calculated. Pb is derived from equation 2 and 3 for 1 Mbps and 2
Mbps data rate respectively.
Sent by Basis Mode (1Mbps, 0.192 ms)
Octets: 18 2 1 1 2 2
SYNC SFD Signal Service Length CRC 3 Related Works
PLCP Preamble in 802.11b(144bits) PLCP header in 802.11b(48bits)
3
are reset to zero after a successful data transmission. Equations (7) and (8) are solved for the values of p and
Data frames are discarded when LRC (SRC) reaches τ . Once these probabilities are obtained, this model com-
dot11LongRetryLimit (dot11ShortRetryLimit). The default putes the saturation throughput Z(p, τ ) of a station. The
values for dot11LongRetryLimit and dot11ShortRetryLimit expression of the throughput is given in Section 4.3, where
are 4 and 7 respectively. Considering this limitation, the we adapt this model to our context. None of the above mod-
Markov chain proposed by Bianchi is modified in [6] as els have considered the channel characteristics (PHY layer).
shown in Fig. 4. Unlike paper [2], in Wu model m is There are a few studies that consider the PHY layer char-
the maximum backoff stage (retransmission count) which acteristics in 802.11 WLANs. We overview them in what
0
is different for data frame and RTS. In Wu model, m repre- follows.
0
sents the maximum contention window, i.e. 2m (CWmin + In [10], the impact of an error-prone channel over all
1) = (CWmax + 1). In fact the key difference between performance measures is analytically analyzed for a traffic
Bianchi model [2] and Wu model [6], is that the Markov saturated IEEE 802.11 WLAN. A modified Markov chain
chain models are different, which is because Wu model con- is used to compute the transmission probability per station:
siders the effects of frame retransmitting limit. the backoff window size that considers the frame-error rates
and the maximal allowable number of retransmission at-
1/W0
tempts. The transition probability from one stage to an-
!
!
!
!
!
!
!
!
!
!
! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
!
!
!
!
!
!
!
!
!
!
! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
!
!
!
!
!
!
!
!
!
!
! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
!
!
!
!
!
!
!
!
!
!
! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
!
!
!
!
!
!
!
!
!
!
! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
1−p 1 1 1 1
(0, 0) (0, 1) (0, 2) (0, W0 − 2) (0, W0 − 1)
p
also the probability of an unsuccessful (re)transmission at-
1/Wi
mitted on the channel. They supposed that the unsuccessful
(re)transmission attempt can happen due to: collision of this
1−p 1 1 1 1
(i, 0) (i, 1) (i, 2) (i, Wi − 2) (i, Wi − 1)
p
1/Wm
ror frame, occurring with probability Pf (due to the channel
1
(m, 0)
1
(m, 1)
1
(m, 2)
1
(m, Wm − 2)
1
(m, Wm − 1)
fading and/or noise). Then they supposed that both events
are independent and the probability p can be expressed as:
p = 1 − (1 − p1 )(1 − Pf )
Figure 4. Markov model for backoff window. Other calculations are similar to the Markov model (see
Equation (8)). Similar to [2] they express the normalized
In this Bianchi model, the time is divided into slots of saturation throughput of IEEE 802.11 DCF within a single
variable duration based on what happens during a slot: no WLAN cell in an error-prone channel.
transmission, correct transmission, collision. The model In [12], an improved analytical model that calculates
computes among others the probability that a station trans- IEEE 802.11 DCF performance taking into account both
mits in a slot τ , the probability that a transmitted packet col- packet retry limits and transmission errors for the IEEE
lides with other transmissions p, and the saturation through- 802.11a protocol is proposed. Their analysis is very sim-
put of a station Z(p, τ ), which is a function of τ and p as ilar to the model presented in [10].
well as other physical parameters. The packet loss proba- Finally, [13] proposes an analytical model to compute
bility is computed as: the throughput for the single and multi-user cases with a
non ideal channel. This model is validated with system sim-
p = 1 − (1 − τ )n−1 (7) ulations in realistic deployment scenarios. Some changes in
Bianchi’s Markov chain model are proposed as well. In ad-
where n is the total number of STAs. The model also dition they have assumed that the probability Pj , (the failure
gives the expression of τ as a function of the packet loss probability viewed by the station when a packet is transmit-
probability p using the Markov chain that describes the sys- ted) is due to either a collision on the channel (with proba-
tem, see Fig. 4. Let B be the function relating p and τ in bility Pcj ) or without collision but error transmission (with
this model, then: probability P ER). Hence: pj = Pcj + (1 − Pcj )P ER
1 − pm+1 None of these models have considered specific physical
τ = B(p) = b0,0 (8) aspects like modulation, FEC, PLCP format in IEEE 802.11
1−p
or the channel characteristics (e.g. the distance between
and b0,0 (Which is the stationary probability to find the the source and the destination). Our approach tries to pro-
Markov chain in state (0, 0)) can be obtained from solving vide more precise results considering these characteristics
the Markov chain as shown in Equation (9). in IEEE 802.11.
4
2(1−2p)(1−p) 0
W (1−(2p)m+1 )(1−p)+(1−2p)(1−pm+1 ) m≤m
b0,0 = (9)
2(1−2p)(1−p) 0
0 0 0 0 m>m
W (1−(2p)m +1 )(1−p)+(1−2p)(1−pm+1 )+W 2m p(m +1) (1−2p)(1−pm−m )
where L(Di ) expresses the power with which the sig- Suppose we are given the distance vector D =
nal of STA i arrives at the AP after being attenuated over {d1 , . . . , dn }, where di describes the distance of STA i to
distance Di and calculated using simple path loss model; the access point. Since all distances are fixed, we omit in
this section the index of distance from loss and transmis-
P0 sion probabilities. For an STA k, we aim at finding the pdf
L(Di ) = . (12) of Ik . Ik gives the interfering power produced by all the
Diα
5
other STAs at the AP. To compute Ik , we need fX (x), the STAs is supposed to influence the transmission probability
pdf of the power at the AP of an individual STA. For an of STA i. This is the case when the number of STAs is large.
STA i, fXi (x) can be written as: Under this assumption, the variables Xi are independent of
each other. We can therefore compute the pdf of Ik using
fXi (x) = δx (0)(1 − τi ) + δx (L(di ))τi , (16) Equation (15) and (21).
where δx (x0 ) is a Dirac pulse at x = x0 and τi denotes Note that fIk is a function of one unknown E[τi (Di )].
the transmission probability of STA i. fIk (x) can be com- The packet collision probability can be obtained by plug-
puted using Equation (15). Note that the values τi in fIk (x) ging fIk in Equation (17). We substitute then the expres-
are left unknown. sion of pk (dk ) in Equation (8) to get τk (dk ), the probability
Using Equation (10) and taking expectation, we get the with which STA k transmits a packet in a slot time aver-
packet loss probability of STA k: aged over all possible positions of the other STAs. Finally,
the throughput of STA k averaged over all locations of the
other STAs can be computed in a similar way to the fixed
pk = E[1 − (1 − PbP LCP )LP LCP · (1 − PbP ayload )LP ayload ] case as will be discussed in Section 4.3.
(17) Now we explain how to find the expression of E[τi (Di )].
For example when the packet is sent with 1 Mbps, the To solve for this expectation, we write an implicit equation
equation can be simplified as shown in Equation (18) (Since with E[τi (Di )] as a variable, then we solve this equation
the PLCP and the payload are sent with the same modula- numerically. Equations (21) and (17) give us the expression
tion and data rate). of pk (dk ) for STA k as a function of E[τi (Di )]. Denote by
This expression of pk is a function of the transmission pk (dk ) = G(dk , E[τi (Di )]) this expression. Using 17, we
probabilities of the other STAs via the pdf functions fXi . can write;
From the Bianchi model, the transmission probability of an
STA is related to its collision probability via the function in
Equation (8) (by substituting p by pk and τ by τk ). Thus, τk (dk ) = B(pk (dk )) = B(G(dk , E[τi (Di )])) (22)
using Equations (8) and (17), we set up a non linear system
of equations, which can be solved numerically for all pk and We get our implicit equation in E[τi (Di )] by summing
τk . Having the pk and τk , the throughput of any STA k can over all the values of dk , as shown in Equation (23).
be computed. This computation is shown in Section 4.3.
Z r
2πρdρ
4.2 Random Topologies E[τi (Di )] = E[B(pk (dk ))] = B(G(ρ, E[τi (Di )])).
0 πr2
(23)
We consider now the case where the STAs are uniformly Once we obtain E[τi (Di )], all transmission probabilities,
distributed in a disk of radius r around the AP. Thus, the pdf collision probabilities and throughput can be obtained using
of D (the distance to the AP of an STA) has the following our above analysis. In summary, for an STA located at dis-
form: tance dk :
2d
fD (d) = {10≤d≤1 } . (19) • The packet collision probability pk (dk ) can be ob-
r2
tained by plugging Equation (22) in (17), where the
Consider an STA k located at distance dk from the AP,
value of E[τi (Di )] is computed numerically with the
and let us focus at computing its average performance over
implicit Equation (23).
all possible positions of the concurrent STAs. As for fixed
topology case, we have to find the pdf of Ik (The interfer- • The packet transmission probability τk (dk ) is com-
ence caused by the other STAs at the AP.). puted by substituting p by pk (dk ) in Equation (8).
However the computation of fXi (x) (the pdf of signal
power at the AP of a random STA i) becomes more com- • Given pk (dk ) and τk (dk ), the throughput of STA k can
plex. We first write the cumulative distribution function be obtained in a similar way to the Bianchi model. The
of Xi (for x ≥ 0), see Equation (20). In this equation, throughput of a random STA can be computed as well.
E[τi (Di )] is the transmission probability of an STA i aver-
aged over all its possible locations. By differentiation and 4.3 Throughput Calculation
using the expression of L(Di ), we find the pdf of Xi , see
Equation (21). We now derive the throughput of a single STA k at a
Assume that the transmission probability of a random given distance dk . In the case of a fixed topology (Sec-
STA i is only dependent on its own position and indepen- tion 4.1) this throughput depends on the position of all other
dent of that of the others. Only the number of the other STAs and their transmission probabilities τi , whereas in the
6
Z Ã Ãs !!LP LCP +LP ayload
∞
2L(dk )W
Pk = 1 − 1−Q fIk (x)dx. (18)
x=0 (N0 + x)R
µ ¶
(L−1 (x))2
FXi (x) = (1 − E[τi (Di )]) + 1{P0 /rα ≤x≤P0 } E[τi (Di )] 1 − . (20)
r2
µ ¶2/α
2 P0
fXi (x) = δx (1 − E[τi (Di )]) + 1{P0 /rα ≤x≤P0 } 2 E[τi (Di )]. (21)
αr x x
7
3
3 when it contends for the medium with one or more
4
2 fixed STAs (Ppkt−loss−mov ).
4 2
8
900 1600
Distance-aware Model BPSK (1Mbps) Distance-aware Model QPSK (2Mbps)
ns-2 simulation results BPSK (1 Mbps) ns-2 simulation results QPSK (2 Mbps)
Bianchi’s Model (1 Mbps) 1550 Bianchi’s Model (2 Mbps)
800 1450
1400
750
1350
700 1300
0 2 4 6 8 10 12 14 0 2 4 6 8 10 12 14
Number of stations Number of stations
Figure 6. Simulation and Model comparison for fixed scenarios for left: 1 Mbps and right: 2 Mbps.
450
240 Distance Aware Model (Fixed Station) Distance Aware Model (Fixed Station)
Distance Aware Model (Moving Station) Distance Aware Model (Moving Station)
ns-2 simulation (Fixed Station) ns-2 simulation (Fixed Station)
220 ns-2 simulation (Moving Station) 400 ns-2 simulation (Moving Station)
160 300
140
250
120
100 200
0 5 10 15 20 25 0 5 10 15 20 25
Distance (meter) Distance (meter)
Figure 7. Simulation and Model comparison for moving scenarios, left: 1 Mbps and right: 2 Mbps.
X5 µ ¶
5 i
bino(i, 5, τf ix ) = τf ix (1 − τf ix )5−i δx (i). (29)
x=0
i
1 1
0.01 0.01
Probability of packet loss
Probability of packet loss
0.0001 0.0001
1e-06 1e-06
1e-08 1e-08
1e-10 1e-10
1e-12 1e-12
Packet of a fixed station corrupted by the moving station Packet of a fixed station corrupted by the moving station
Packet of the moving station corrupted by a fixed station Packet of the moving station corrupted by a fixed station
1e-14 1e-14
0 5 10 15 20 25 0 5 10 15 20 25
Distance (meter) Distance (meter)
Figure 8. Packet corruption probability of the moving station, left: 1 Mbps and right: 2 Mbps.
9
150
Random topology: Moving STA
[5] C. H. Foh, M. Zukerman, “Performance Analysis of
Random topology: Fix STA the IEEE 802.11 MAC Protocol”, Proceedings of the
140 250 Realization with fixed topology: Moving STA
250 Realization with fixed topology: Fix STA
130
EW 2002 Conference, Italy.
Mean Throughput (Kbps)
10